Tools

Explore our curated list of tools.

288 listed tools Last update on 2025-06-12

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

Anonymity

Explore 

Cover Your Tracks 

Free    

Test your browser against tracking and fingerprinting.

I2P 

Open-source      

Fully-encrypted private network layer

Nipe 

Open-source      

Script to make Tor your default gateway

Tor 

Open-source      

Onion-routed overlay network

What Every Browser Knows About You 

Free    

Test your own Web browser's configuration

CTF Tools

Explore 

Pwntools 

Open-source      

Rapid exploit development framework for CTFs

RsaCtfTool 

Open-source      

Attack and decrypt RSA tools

DDoS

Explore 

CC-attack 

Open-source        

Socks4/5 proxy-based multithreading attack

DDOS Ripper 

Open-source          

DDOS attack server based on compromised computer systems

HOIC 

Open-source        

LOIC with countermeasure workarounds

MHDDoS 

Open-source        

Python3 DDoS attack script with 56 methods

Raven-Storm 

Open-source        

DDoS Toolkit with multiple attack protocols

SlowLoris 

Open-source        

Low bandwidth DDoS tool in Python

T50 

Open-source        

Network stress tool

UFONet 

Open-source        

Denial of service toolkit with multifunctionality

Defense and Evasion

Explore 

AntiVirus Evasion Tool (AVET) 

Open-source      

Antivirus evasion tools

Fireprox 

Open-source      

AWS API Gateway management tool for IP rotation

Hyperion 

Free      

Runtime encryptor for 32-bit portable executables ("PE .exes")

peCloak.py 

Free      

Hides malicious Windows executable from antivirus

peCloakCapstone 

Open-source      

Multi-platform fork of peCloak.py

Proxybroker2 

Open-source      

Auto-rotate IP via proxy

Dorks

Explore 

BinGoo 

Open-source    

GNU/Linux bash-based Bing and Google Dorking Tool

dork-bot 

Open-source    

Command line Google dork tool

Dorksearch 

Free    

Easy dorks with pre-build queries.

fast-recon 

Open-source    

Script to perform Google dorks against a domain

GooDork 

Open-source    

Command line Google dorking tool

snitch 

Open-source    

Scripts to use dorks to gather information

Frameworks

Explore 

Caldera 

Open-source        

A framework for adversary emulation by MITRE

Cobalt Strike 

Commercial        

A Fortra VM & threat emulation framework

Dshell 

Open-source        

Network forensic analysis framework

Empire 

Open-source        

Post-exploitation adversary emulation framework

ExploitPack 

Commercial      

Graphical tool with 39,000+ exploits for pentest automation

Metasploit 

Commercial   Open-source        

Post-exploitation pentest tools to verify vulnerabilities, manage assessments, and more.

Pupy 

Open-source      

Cross-platform remote administration and post-exploitation tool in Python & C

Recon-ng 

Open-source    

A web-based reconnaissance framework

ReNgine 

Open-source    

Open-source reconnaissance framework

routersploit 

Open-source      

Open-source exploitation framework for embedded devices

shellsploit 

Open-source      

Exploit development framework

WordPress Exploit Framework 

Open-source    

Ruby framework for WordPress pentesting

Fuzzing & Input Mutation

Explore 

Dirb 

Open-source    

Web content scanner and fuzzer

Ffuf 

Open-source    

Web fuzzer

Netzob 

Open-source    

Reverse engineer, model, and fuzz networks

Hashing & Cryptography

Explore 

AirCrack 

Open-source      

Wifi password retrieval with FMS

BruteForce Wallet 

Open-source      

Wallet password search

ctf-tools 

Open-source      

Scripts to install various security research tools and deploy to new machines

Hashcat 

Open-source      

Hash cracking tool

John the Ripper 

Open-source      

Password cracker

JWT Cracker 

Open-source      

HS256 JWT token brute force cracker

Medusa 

Open-source      

Brute-force parallel testing password cracker

Rainbow Crack 

Free      

Hash cracker using large-scale time-memory technique

Rainbow Tables 

Free      

Rainbow table generator with verification

Hex Editors

Explore 

Frhed 

Open-source      

Binary file editor for Windows with partial file loading capabilities

FS Hex Editor 

Open-source      

Hexadecimal and ASCII file editor

Hackman 

Open-source      

Hex and binary editor with RAM viewer

HexEdit.js 

Open-source      

Browser-based hex editing

Hexinator 

Commercial      

Hex tool with free and premium versions

Hexplorer 

Open-source      

Hex editor with data mining tools

HxD Hex Editor 

Open-source      

View, edit, and save hex and source code files

Kaitai Struct 

Open-source      

Generate parsers and protocols

MiTeX Hexadecimal 

Commercial      

Hex and Octal file editor with calculator

Open Freely 

Freeware      

Hex viewer and editor

Tiny Hexer 

Open-source      

Hex viewer, binary searcher, and octal viewer

Tyrannosaurus Hex 

Open-source      

Open-source hex editor with color coding

UltraEdit 

Commercial      

Text, code, and hex editor

Veles 

Open-source      

Binary data visualization and analysis tool

IoT

Explore 

Praeda 

Open-source      

Data harvester for multi-function printer assessments

Printer Exploitation Toolkit (PRET) 

Open-source      

USB or network program for printer security mapping & exploitation

routersploit 

Open-source      

Open-source exploitation framework for embedded devices

Linux Distros

Explore 

ArchStrike 

Open-source      

Arch GNU/Linux repository closely following Linux Standards

AttifyOS 

Open-source      

GNU/Linux distribution built around IoT pentesting

BackBox 

Free        

Ubuntu-based distribution for penetration tests and security assessments

BlackArch 

Open-source      

Arch GNU/Linux-based distribution with 2,500+ tools

CAINE 

Free      

Computer Aided Investigative Environment is a digital forensics and analysis framework

Fedora Security Lab 

Free      

Test environment for security auditing, forensics, system rescue, etc.

Kali 

Free      

GNU/Linux distro for digital forensics and pentesting

Linux Kodachi 

Free      

A Debian-based distro, boot from CD/USB, filters traffic through TOR and attempts trace cleanup after use

Network Security Toolkit (NST) 

Free      

Fedora-based bootable live operating system

ParrotOS 

Open-source      

Distro featuring multiple architecture options and 100+ pentest tools

Pentoo 

Open-source      

Security-focused live USB-based on Gentoo for 32/64-bit OS

Tails 

Open-source      

Security-focused Debian-based distro for anonymity and privacy using Tor

The Pentesters Framework 

Open-source      

Distro is organized around Penetration Testing Execution Standard (PTES)

Trace Labs OSINT VM 

Free    

A virtual machine bundled with OSINT tools maintained by Trace Labs

Mobile Exploitation

Explore 

Dex2Jar 

Open-source    

Tool for Android ".dex" and Java ".class" files

Drozer 

Open-source    

A mobile app security testing framework

Frida 

Open-source    

Dynamic instrumentation toolkit

Frida "Universal" SSL Unpinner 

Open-source    

Universal unpinner

Genymotion 

Commercial    

Cross-platform Android emulator for developers & QA engineers

Jadx 

Open-source    

Command line and GUI tool for producing Java source code from Android Dex and APK files

MobSF 

Open-source    

Automated mobile app pentesting, malware analysis and security assessment framework with SAST and DAST

Network

Explore 

BetterCAP 

Open-source      

Modular, portable man-in-the-middle framework

CrackMapExec 

Open-source        

Suite of tools for network penetration

dnschef 

Open-source      

Highly configurable DNS proxy

dnsenum 

Open-source    

Perl script with DNS enumeration, zone transfer, dictionary attack, and reverse lookup functionality

Dripcap 

Open-source      

Caffeinated packet analyzer for multiple OS

dsniff 

Open-source      

Recon & infiltration tools for networks

Ettercap 

Open-source      

Comprehensive suite for man-in-the-middle attacks

evilgrade 

Open-source      

Fake update injection

impacket 

Open-source      

Network protocol toolset focused on low-impact access

Intercepter-NG 

Open-source      

Multifunctional network toolkit for recon & interception

Morpheus 

Open-source      

Automated ettercap TCP/IP hijacking tool

pig 

Open-source    

Linux packet crafting tool with a library of attack signatures

pwnat 

Open-source    

Punches holes in firewalls/NATs without port or DMZ setup required

Scap-workbench 

Open-source    

A GUI tool with SCAP Scanner and tailoring functionality

scapy 

Open-source      

Python-based interactive packet manipulation program & library

tcpdump/libpcap 

Open-source    

Command-line packet analyzer tool

Wireshark 

Open-source    

A graphic interface surrounding tcpdump / network protocol analyzer

Yersina 

Open-source    

A network tool for 2-layer attacks

Zarp 

Open-source    

Network attack tool for the exploitation of protocols and stacks

OSINT

Explore 

AQUATONE 

Open-source    

Create attack surface maps of subdomains with pre-compiled binaries

Archive.org 

Free    

A digital archive providing historical snapshots of websites and other media for OSINT and research purposes

BlutoRS 

Open-source    

Revived and enhanced DNS reconnaissance and enumeration tool, offering subdomain brute-forcing, email harvesting, and metadata analysis

BuiltWith 

Commercial   Free    

Web technology profiler used for OSINT, competitive analysis, and cyber reconnaissance

C99.nl 

Commercial    

Subdomain scanning tool

Caipora 

Free    

Brazilian OSINT tool listing

Censys 

Commercial   Free    

Threat intelligence and mapping platform

creepy 

Open-source    

Geolocation gathering via social media platforms

crt.sh 

Free    

Certificate Transparency log search engine for discovering issued SSL/TLS certificates

DataSploit 

Open-source    

OSINT framework based around corporate espionage

Debookee 

Commercial    

Network traffic interception and analysis for Mac

Dirsearch 

Open-source    

Command line tool to brute force directories and files

Dnsgen 

Open-source    

This tool generates a combination of domain names from the provided input

Drako OSINT 

Free    

Curated collection of open-source intelligence tools and resources, organized for targeted investigations across various domains

Etherape 

Open-source    

A graphical network monitor for Unix with graphic network activity display

Gau 

Open-source    

Getallurls (gau) fetches known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl

Intelx.io 

Free   Commercial    

OSINT search engine and data archive indexing darknet, leaks, and public records

JSParser 

Open-source    

A python script to parse relative URLs from JavaScript files

Maltego 

Commercial    

Open-source intelligence and graphical link analysis tool for gathering and connecting information for intelligence and forensics.

metagoofil 

Open-source    

Metadata harvester with email extraction functions

MxToolbox 

Free   Commercial        

Email and network diagnostic platform offering tools for blacklist monitoring, DNS lookups, and email deliverability analysis

NetCat 

Open-source    

A networking tool for reading and writing data across networks

Nipper 

Commercial    

Network configuration & audit tool for internal teams

OSINT Resources by Country 

Open-source    

Community-driven repository compiling OSINT tools and resources categorized by country, facilitating targeted open-source investigations

Seclists 

Open-source    

Security testing data repository

Shodan 

Commercial   Free    

Search for Internet-connected devices

SSL Labs 

Free    

Service by Qualys that performs deep analysis of SSL/TLS configurations for public web servers

Subfinder 

Open-source    

A subdomain discovery tool that discovers valid subdomains for websites by using passive online sources

Sublist3r 

Open-souce    

Fast subdomain enumeration tool that uses OSINT sources and brute-force techniques to aid hunters in mapping domain footprints

theHarvester 

Open-source    

Harvest E-mail, subdomain and names via OSINT

Unfurl 

Open-source    

Analyze URLs and estimate entropies to find URLs that might be vulnerable to attack

Waybackurls 

Open-source    

Accept line-delimited domains on stdin, fetch URLs from the Wayback Machine for *.domain and output them on stdout

Web-Check.xyz 

Open-Source    

Open-source website analysis tool to identify potential vulnerabilities and security misconfigurations

Wesley's OSINT 

Free    

Curated collection of open-source intelligence tools and resources, organized for targeted investigations across various domains

XRay 

Open-source    

Recon, mapping, OSINT for public networks

ZoomEye 

Commercial    

Network component search engine

Pentest Management Platforms

Explore 

AttackForge 

Commercial    

A pentest management and reporting tool

Faraday 

Commercial    

Multiuser pentesting environment for red teams performing coop tests, security audits, and risk assessments.

Reconmap 

Commercial    

A pentest collaboration platform

Pentest Report Generation

Explore 

Dradis 

Free    

Ruby-based open-source report generation tool

MagicTree 

Commercial    

Pentest report generation and streamlining tool with Nmap integration

Metagoofil 

Open-source    

Autofills metadata into reports

PeTeReport 

Open-source    

Python and Django tool to write markdown reports

PwnDoc 

Open-source    

Pentest report generation tool

Serpico 

Open-source    

Pentest report automation tool

Recon & Enumeration

Explore 

Asnlookup 

Open-source    

ASN Information tool

BlindElephant 

Open-source    

Web application identifier and fingerprinter.

BuiltWith 

Commercial   Free    

Web technology platform that identifies the tech stack of websites, aiding in reconnaissance and infrastructure analysis

Chaos 

Open-source    

Internet-wide asset data for research and recon

cms-explorer 

Open-source    

Reveal the specific modules, plugins, components, and themes run by CMS websites + associated vulnerabilities

DET 

Open-source    

Data exfiltration tool for DLP configuration errors

EyeWitness 

Open-source    

Screenshot, server header, and default credentials tool

FuzzDB 

Open-source    

Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery

Have I Been Pwned? 

Free    

Service to check if your email or phone number has been compromised in a data breach

IntelX 

Commercial    

OSINT search engine and data archive for email, domain, IP, Bitcoin address, and more

OnionScan 

Open-source    

Discover vulnerabilities available through Onion-operated services

Recon_profile 

Open-source    

Alias creation tool

Retire.JS 

Open-source    

Browser plugin for finding vulnerable js libraries

Skipfish 

Open-source    

An active web-application security reconnaissance tool

smbmap 

Open-source    

SMB enumeration tool

Spiderfoot 

Open-source    

Automated OSINT and data collection

Teh_s3_bucketeers 

Open-source    

Discover S3 buckets on Amazon's AWS platform.

Transformations 

Open-source    

Browser-based data obscurity detection tool

VHostScan 

Open-source    

Virtual host scanner that performs reverse lookups

Virtual-host-discovery 

Open-source    

Enumerate virtual hosts on an IP / HTTP scanner

wafw00f 

Open-source    

Identifies and fingerprints Web Application Firewall (WAF)

Wappalyzer 

Open-source    

A browser extension to identify technologies used on websites

webscreenshot 

Open-source    

Screenshot script

WhatWeb 

Open-source    

Web scanner and fingerprinter

zmap 

Open-source    

Open source network scanner with 13+ tools for further research & scans

Red Teaming

Explore 

APT Simulator 

Open-source          

Script & toolset to simulate the appearance of an APT attack

Atomic Red Team 

Open-source          

Library of tests mapped to the MITRE ATT&CK Framework

ATT&CK Simulator 

Open-source          

Automate adversary simulations for red/blue-purple teaming

BlindSpot 

Commercial          

Adversary simulator with red-team, breach simulation, and purple team capabilities.

Caldera 

Open-source            

A framework for adversary emulation by MITRE

Cobalt Strike 

Commercial              

A VM & threat emulation framework for adversary simulation / red teaming

Cymulate 

Commercial              

Security posture management platform with red teaming

Dumpsterfire 

Open-source          

Menu-driven tool for building distributed security events for red/blue/purple team drills

GreyMatter 

Commercial              

Security operations platform with red teaming (formerly Threatcare)

Infection Monkey 

Open-source              

Open-source breach and attack simulation platform

Invoke Adversary 

Open-source          

Script for automating adversary threats

Mandiant 

Commercial              

Security validation and adversary simulation tool in Google Cloud

MATE 

Commercial          

Attack Simulator offered by Microsoft as part of 365

Metta 

Open-source          

Open-source tool for network adversarial simulation

NSAUnfetter 

Open-source              

Attack simulator based on the MITRE ATT&CK framework

Pentera 

Commercial              

Automate insider & outsider attacks for red-team/purple team exercises

Red Team Automation (RTA) 

Open-source              

Scripts based on 50+ MITRE ATT&CK tactics for blue teams

SafeBreach 

Commercial              

Breach and attack simulation platform

Scythe.io 

Commercial              

Cloud adversary emulation platform for red-team/purple team

SimSpace 

Commercial              

Simulated environment for cybersecurity exercises

Splunk Attack Range 

Open-source              

Cloud and local environment builder for attack simulation

THC Hydra 

Open-source          

Attack-simulator tool for unauthorized access

Reverse Engineering

Explore 

binwalk 

Open-source    

Analyze, reverse engineer, and extract firmware images

Capstone 

Open-source    

Lightweight multi-platform, multi-architecture disassembly framework

dnSpy 

Open-source    

.Net debugger and assembly tool

Evan's Debugger 

Open-source    

Debugger for GNU/Linux

Immunity Debugger 

Commercial    

Debugger with exploit and malware capabilities

Interactive Disassembler (IDA Pro) 

Commercial    

A multi-processor disassembler and debugger with free/premium versions

Medusa 

Open-source    

Open source, cross-platform interactive disassembler

peda 

Open-source    

Python Exploit Development Assistance for GDB

plasma 

Open-source    

Interactive disassembler for x86/ARM/MIPS

PyREBox 

Open-source    

Python scriptable Reverse Engineering sandbox and framework

Radare2 

Open-source    

Toolchain for forensics, software reverse engineering, exploiting, debugging, etc.

rVMI 

Open-source    

Full system analysis via virtual machine introspection

Voltron 

Open-source    

Debugger UK for hackers

WDK/WinDbg 

Commercial    

Microsoft Windows Driver Kit and WinDbg

x64dbg 

Open-source    

Open source x64/x32 debugger

Social Engineering

Explore 

Beelogger 

Open-source      

Tool for generating keyloggers for Windows

Catphish 

Open-source    

Ruby phishing toolkit

Evilginx2 

Open-source      

MITM attack framework used for phishing credentials and session cookies with 2-factor bypass

Gophish 

Open-source      

Powerful, open-source phishing framework to simulate and manage phishing campaigns

King Phisher 

Open-source      

Create and manage simultaneous phishing attacks with server and content tools

Social Engineer Toolkit (SET) 

Open-source      

Social engineering toolkit with framework

wifiphisher 

Open-source    

Automated phishing attacks against WiFi networks for red teaming or WiFi investigations

Static and Dynamic Analyzers

Explore 

bandit 

Open-source      

Python code analyzer with a focus on vulnerabilities

Brakeman 

Open-source      

Static analysis security vulnerability scanner for Ruby on Rails applications

Checkmarx 

Commercial        

Full suite of SAST, DAST, and code scanning tools built for internal teams

Codacy 

Commercial      

AI-driven SAST for 40+ programming languages

Coverity 

Free      

Free static analysis solution for open-source projects

cppcheck 

Open-source      

Extensible C/C++ static analyzer and bug finder

Docker Scout 

Free      

Container analysis and vulnerability insights tool from Docker

FindBugs 

Open-source      

Free Java static analyzer with a focus on bugs

Forta WebInspect 

Commercial      

Web application vulnerability scanner and analyzer

Kiuwan 

Commercial      

SAST and code analysis for vulnerability management

KlocWork 

Commercial      

Compliance-based SAST

PMD 

Open-source      

Source code analyzer for cross-language SaaS

Snyk 

Commercial      

Vulnerability database and code scanner

sobelow 

Open-source      

Phoenix Framework static analyzer focused on vulnerabilities

SonarQube 

Commercial      

Static code analysis for 30+ languages, frameworks, and platforms

Trivy 

Open-source      

Simple and comprehensive vulnerability scanner for containers and other artifacts

Veracode 

Commercial      

Static analysis and vulnerability management

Threat Analysis

Explore 

Hybrid Analysis 

Commercial   Free            

Malware analysis service powered by CrowdStrike, offering in-depth behavioral reports and threat intelligence for submitted files and URLs

urlscan.io 

Commercial   Free        

Web sandbox and threat intelligence platform for scanning, analyzing, and archiving website behavior and malicious indicators

VirusTotal 

Commercial   Free            

Free online service aggregating multiple antivirus engines and tools to analyze files and URLs for malware, facilitating threat detection and intelligence sharing

Threat Intelligence

Explore 

AbuseIPDB 

Free   Commercial        

Community-driven IP address blacklist and threat intelligence platform for reporting and checking abusive IP activities

AlienVault OTX 

Open-access    

Open Threat Exchange platform offering community-driven threat intelligence with real-time indicators of compromise (IoCs)

Cisco Talos 

Free            

Threat intelligence and research division of Cisco, providing real-time protection and insights into global cyber threats

Cloudflare Radar 

Free    

Internet intelligence platform offering real-time insights into global traffic, security threats, protocol adoption, and DNS trends

Hudson Rock 

Free   Commercial            

Cybercrime intelligence platform specializing in infostealer malware data to detect and mitigate compromised credentials

ThreatBook 

Free   Commercial    

Cyber threat intelligence platform offering high-fidelity, actionable insights for detection, response, and protection

Web Testing

Explore 

ActiveScan++ (Burp Addon) 

Open-source    

Active & passive scanning extending basic capabilities

Autorepeater Burp (Burp Addon) 

Open-source    

Automated HTTP request repeating

Autorize (Burp Addon) 

Open-source    

Detect authorization vulnerabilities

Browser Exploitation Framework (BeEF) 

Open-source      

Command and control server for delivering exploits

Burp Suite 

Commercial      

An integrated platform for web-application pentesting (Free edition available)

BurpSentinel (Burp Addon) 

Open-source    

Web application security hole discovery

Co2 (Burp Addon) 

Open-source    

SQL mapper, scanner, SAML encoder, JWT decoder, hasher

Commix 

Open-source    

Command-line injection & exploitation tool

DirBuster 

Open-source    

Brute-force over directories and web application server tool with hidden directory search

fimap 

Open-source    

Python tool to find, prepare, audit, & exploit LFI/RFI bugs.

Flow (Burp Addon) 

Open-source    

Logging and history for tools, for troubleshooting

Headless Burp (Burp Addon) 

Open-source    

Run Burp Suite's Spider and Scanner tools via command-line

Kadimus 

Open-source    

LFI scan and exploit tool.

Lazys3 

Open-source    

Ruby script to brute-force for AWS s3 buckets

LFI Suite 

Open-source    

LFI exploiter and scanner

liffy 

Open-source    

LFI exploitation tool

Logger++ (Burp Addon) 

Open-source    

A multi-threaded logging extension with filtering

Nikto 

Open-source        

Web server vuln scanner that performs comprehensive tests to identify dangerous files, outdated server software, and misconfigurations

NoSQLMap 

Open-source    

Audit for and automate injection attacks, exploit configuration weaknesses, and clone data

OWASP Zed Attack Proxy (ZAP) 

Open-source    

Scriptable HTTP intercepting proxy and fuzzer for web applications

ParamMiner (Burp Addon) 

Open-source    

Discover hidden web application parameters

Payloads All The Things 

Open-source    

Payloads and bypasses for Web Application Security.

Retire.js (Burp Addon) 

Open-source    

Scan for outdated Javascript libraries

Security Headers 

Free    

Free tool for analyzing HTTP response headers to assess web application security posture and recommend improvements

SQLMap 

Open-source    

SQL injection detection, exploitation, and takeover tool

SQLNinja 

Open-source    

An SQL server injection and takeover tool

sslstrip2 

Open-source    

SSL stripping tool

SSRFTest 

Open-source    

Server Site Request Forgery tool

Subjack 

Open-source    

Subdomain identification and takeover tool written in Go

tplmap 

Open-source    

Server-side template injection, detection, and takeover tool

TurboIntruder (Burp Addon) 

Open-source    

Fast and scalable HTTP requests via python scripts

weevely3 

Open-source      

Weaponized web shell for post exploitation

WPSploit 

Open-source    

Exploit WordPress websites with Metasploit

WSDL Wizard (Burp Addon) 

Open-source    

Scan target servers for WSDL files

YsoSerial 

Open-source    

Payload generation tool to exploit unsafe Java serialization

Wireless

Explore 

Aircrack-ng 

Open-source    

Testing & auditing tools for wireless networks

Fluxion 

Open-source    

Suite of automated social engineering-based WPA attacks and analysis

Kismet 

Open-source    

Wireless network detector, sniffer, and WIDS

Reaver 

Open-source    

Brute force attack against WiFi Protected Setup.

Wifite2 

Open-source    

Python script to audit wireless networks